๐Ÿ” CVE Alert

CVE-2023-5870

LOW 2.2

Postgresql: role pg_signal_backend can signal certain superuser processes.

CVSS Score
2.2
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

CWE CWE-400
Vendor red hat
Product red hat advanced cluster security 4.2
Published Dec 10, 2023
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat advanced cluster security 4.2

Be the first to know when new low vulnerabilities affecting red hat red hat advanced cluster security 4.2 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low

Affected Versions

Red Hat / Red Hat Advanced Cluster Security 4.2
All versions affected
Red Hat / Red Hat Advanced Cluster Security 4.2
All versions affected
Red Hat / Red Hat Advanced Cluster Security 4.2
All versions affected
Red Hat / Red Hat Advanced Cluster Security 4.2
All versions affected
Red Hat / Red Hat Advanced Cluster Security 4.2
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Software Collections for Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Software Collections for Red Hat Enterprise Linux 7
All versions affected
Red Hat / RHACS-3.74-RHEL-8
All versions affected
Red Hat / RHACS-3.74-RHEL-8
All versions affected
Red Hat / RHACS-3.74-RHEL-8
All versions affected
Red Hat / RHACS-3.74-RHEL-8
All versions affected
Red Hat / RHACS-3.74-RHEL-8
All versions affected
Red Hat / RHACS-4.1-RHEL-8
All versions affected
Red Hat / RHACS-4.1-RHEL-8
All versions affected
Red Hat / RHACS-4.1-RHEL-8
All versions affected
Red Hat / RHACS-4.1-RHEL-8
All versions affected
Red Hat / RHACS-4.1-RHEL-8
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Software Collections
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7545 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7579 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7580 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7581 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7616 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7656 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7666 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7667 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7694 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7695 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7714 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7770 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7772 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7784 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7785 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7883 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7884 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7885 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0304 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0332 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0337 access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-5870 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2247170 postgresql.org: https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/ postgresql.org: https://www.postgresql.org/support/security/CVE-2023-5870/ security.netapp.com: https://security.netapp.com/advisory/ntap-20240119-0003/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/11/msg00007.html

Credits

Upstream acknowledges Hemanth Sandrana and Mahendrakar Srinivasarao as the original reporters.